You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/authentication/howto-authentication-passwordless-security-key-on-premises.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,6 +53,10 @@ You must also meet the following system requirements:
53
53
-[Windows Server 2016](https://support.microsoft.com/help/4534307/windows-10-update-kb4534307)
54
54
-[Windows Server 2019](https://support.microsoft.com/help/4534321/windows-10-update-kb4534321)
55
55
56
+
- Have the credentials required to complete the steps in the scenario:
57
+
- An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest. Referred to as **$domainCred**.
58
+
- An Azure Active Directory user who is a member of the Global Administrators role. Referred to as **$cloudCred**.
59
+
56
60
### Supported scenarios
57
61
58
62
The scenario in this article supports SSO in both of the following instances:
@@ -108,10 +112,10 @@ Run the following steps in each domain and forest in your organization that cont
108
112
$domain = "contoso.corp.com"
109
113
110
114
# Enter an Azure Active Directory global administrator username and password.
111
-
$cloudCred = Get-Credential
115
+
$cloudCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group for a domain and a member of the Enterprise Admins group for a forest.'
112
116
113
117
# Enter a domain administrator username and password.
114
-
$domainCred = Get-Credential
118
+
$domainCred = Get-Credential -Message 'An Active Directory user who is a member of the Domain Admins group.'
115
119
116
120
# Create the new Azure AD Kerberos Server object in Active Directory
0 commit comments